ARTICLE
TITLE

Counter Application Trainer for Teaching Aids in Digital Electronic Course

SUMMARY

Teaching aids play a vital role in the teaching and learning process. Teaching aids are crucial in helping students comprehend learning theory. However, most existing counter application trainers as teaching aids in digital electronics courses are developed without following the syllabus in vocational colleges and come at a high price. This study aimed to develop a counter application as teaching aids in digital electronics courses to provide low-cost teaching aids tailored to the curriculum at vocational colleges. This quantitative research applied the Life Development System (SDLC) model. This study developed a counter application trainer for teaching the Electronic and Digital Application course in vocational colleges. The findings showed that the product has been validated by experts based on the product design, suitability, and functionality. Further investigation could be conducted by looking into the trainer's safety features, such as adding a cap to the transformer's supply circuit and the on/off switch. Electric shock can be avoided with this cover.

 Articles related

I. I. Viksnin,E. D. Marinenkov    

The paper deals with the issue of information security in the unmanned aerial vehicles' swarm. In connection with the active development of this technology and its application in various spheres of human activity, one of the most important creation aspec... see more


Rosalind Latiner Raby,Edward J. Valeau    

Alternatives to the traditional four-year public and private university include a sector of higher education that offers a more advanced curriculum than secondary school and serves as a local and often lower-cost pathway that gives options for university... see more


Yazan Alaya Al-Khassawneh    

Artificial intelligence has the potential to address many societal, economic, and environmental challenges, but only if AI-enabled gadgets are kept secure. Many artificial intelligence (AI) models produced in recent years can be hacked by utilizing cutti... see more


Amr Abozeid,AbdAllah Adel AlHabshy,Kamal ElDahshan    

Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected... see more


Alessandro Fiore,Adriana Caione,Luca Mainetti,Luigi Manco,Roberto Vergallo    

Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols. Developers and experts ask for new solutions that speed... see more